Featured Research

from universities, journals, and other organizations

New Design Enables More Cost-effective Quantum Key Distribution

Date:

May 30, 2008

Source:

National Institute of Standards and Technology

Summary:

Researchers have demonstrated a simpler and potentially lower-cost method for distributing cryptographic keys using quantum cryptography, the most secure method of transmitting data. The new method minimizes the required number of detectors, by far the most costly components in quantum cryptography.

Share This

A highly simplified schematic of a recipient's detectors in a quantum cryptography setup. Conventional cryptography setups (left) require at least two detectors, and the most common setup, known as BB84, requires four. By adding an optical component that delays the travel of photons to the detector, the number of required detectors is cut in half

Credit: NIST

Researchers at the National Institute of Standards and Technology (NIST) have demonstrated a simpler and potentially lower-cost method for distributing strings of digits, or "keys," for use in quantum cryptography, the most secure method of transmitting data. The new "quantum key distribution" (QKD) method, outlined in an upcoming paper, minimizes the required number of detectors, by far the most costly components in quantum cryptography.

Related Articles

Although this minimum-detector arrangement cuts transmission rates by half, the NIST system still works at broadband speeds, allowing, for example, real-time quantum encryption and decryption of webcam-quality video streams over an experimental quantum network.

In quantum cryptography, a recipient (named Bob) needs to measure a sequence of photons, or particles of light that are transmitted by a sender (named Alice). These photons have information encoded in their polarization, or direction of their electric field. In the most common polarization-based protocol, known as BB84, Bob uses four single-photon detectors, costing approximately $5,000-$20,000 each. One pair of detectors records photons with horizontal and vertical polarization, which could indicate 0 and 1 respectively. The other pair detects photons with "diagonal", or +/- 45 degree, polarization in which the "northeast" and "northwest" directions alternatively denote 0 and 1.

In the new method, the researchers, led by NIST's Xiao Tang, designed an optical component to make the diagonally polarized photons rotate by a further 45 degrees and arrive at the same detector but later, and into a separate "time bin", than the horizontal/vertical polarized ones. Therefore, one pair of detectors can be used to record information from both kinds of polarized photons in succession, reducing the required number of detectors from four to two.

In another protocol, called B92, the researchers reduced the required number of detectors from two to one. And in work performed since their new paper, the researchers further developed their approach so that the popular BB84 method now only requires one detector instead of four.

Although in theory quantum cryptography can transmit absolutely secure keys guaranteed by fundamental physical principles (measuring them will disturb their values and make an eavesdropper instantly known), the imperfect properties of photon detectors may undermine system security in practice. For example, photon detectors have an intrinsic problem known as "dead time," in which a detector is out of commission for a short time after it records a photon, causing it to miss the bit of data that immediately follows; this could result in non-random (and therefore more predictable) bit patterns in which 0s alternate with 1s. Furthermore, inevitable performance differences between detector pairs can also cause them to record less random sequences of digits. The new design avoids these issues and maintains the security of quantum-key-distribution systems in practical applications.

National Institute of Standards and Technology. (2008, May 30). New Design Enables More Cost-effective Quantum Key Distribution. ScienceDaily. Retrieved March 31, 2015 from www.sciencedaily.com/releases/2008/05/080529124827.htm

More From ScienceDaily

More Matter & Energy News

Featured Research

Mar. 31, 2015 — Researchers have recorded the first direct observations of the micro-scale mechanisms behind the ability of skin to resist tearing. The results could be applied to the improvement of artificial skin, ... full story

Mar. 31, 2015 — A year ago, researchers showed that their software endowed the walking robot Hector with a simple form of consciousness. Their new research goes one step further: they have now developed a software ... full story

Mar. 31, 2015 — Landfills can make a profit from all their rotting waste and a new patent explains exactly how to make the most out of the stinky garbage sites. Decomposing trash produces methane, a landfill gas ... full story

Mar. 31, 2015 — Scientists have achieved an unprecedented level of control over defects in liquid crystals that can be engineered for applications in liquid matter photonics. Sitting with a joystick in the comfort ... full story

Mar. 30, 2015 — Neuroscientists are taking inspiration from natural motor control to design new prosthetic devices that can better replace limb function. Researchers have tested a range of brain-controlled devices ... full story

Mar. 30, 2015 — Speaking in public is the top fear for many people. Now, researchers have developed an intelligent user interface for 'smart glasses' that gives real-time feedback to the speaker on volume modulation ... full story

Mar. 30, 2015 — By studying the morphology and physiology of plants with tiny conical "hairs" or microfibers on the surface of their leaves, such as tomatoes, balsam pears and the flowers Berkheya purpea and Lychnis ... full story

Mar. 30, 2015 — In the first study of its kind, scientists quantitatively show that electric vehicles will meet the daily travel needs of drivers longer than commonly assumed. They found that batteries that have ... full story

Mar. 30, 2015 — One researcher has developed a clever solution to gather naturalistic driving data. For several years, she has been using a detailed driving simulator to study how participants respond to ... full story

Bionic Ants Could Be Tomorrow's Factory Workers

Reuters - Innovations Video Online (Mar. 30, 2015) — Industrious 3D printed bionic ants working together could toil in the factories of the future, says German technology company Festo. The robotic insects cooperate and coordinate their actions and movements to achieve a common aim. Amy Pollock reports.
Video provided by Reuters

Related Stories

Apr. 3, 2014 — An ultra-high security scheme that could one day get quantum cryptography using Quantum Key Distribution into mobile devices has been developed and demonstrated. Secure mobile communications underpin ... full story

Apr. 2, 2012 — Scientists have found a new quantum encryption method to foil even the most sophisticated hackers. Researchers have come up with a simple solution to the untrusted device problem. Their method is ... full story

July 26, 2010 — Computer scientists have proved that cryptography, the practice and study of hiding information, based solely on location is possible by using quantum mechanics. This allows one to encrypt and ... full story

ScienceDaily features breaking news and videos about the latest discoveries in health, technology, the environment, and more -- from major news services and leading universities, scientific journals, and research organizations.